Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

Why do people still use fax machines?

The fax machine is a symbol of obsolete technology long superseded by computer networks – but faxing is actually growing in popularity.

New NIST document offers guidance in cryptographic key generation

(Phys.org)—Protecting sensitive electronic information in different situations requires different types of cryptographic algorithms, but ultimately they all depend on keys, the cryptographic equivalent of a password. A ...

Estonia aiming to be a global e-commerce superpower

The small Baltic country of Estonia hopes digital innovation will turn it into a global superpower in e-commerce by offering foreigners e-residency IDs, and opening the door to doing business online throughout the European ...

Reversible watermarking for digital images

Every picture tells a story, but how do you know that a digital photo has not been manipulated to change the tale being told? A new approach to adding an encrypted watermark to digital images allows the an image to be validated ...

Eight voters register by use of mobile touch-screen devices

The Santa Clara County Registrar of Voters made history Friday when it allowed eight county residents to register to vote by writing their signatures on iPads, iPhones and other mobile touch-screen devices.

Fighting tomorrow's hackers

One of the themes of Dan Brown's The Da Vinci Code is the need to keep vital and sensitive information secure. Today, we take it for granted that most of our information is safe because it's encrypted. Every time we use a ...

Blind signatures using offline repositories

Digital signatures are mechanisms for authenticating the validity or authorship of a certain digital message and they aim to be digital counterparts to real (or analog) signatures. The concept was introduced by Diffie and ...

Signing contracts on the telephone

Internet telephony has developed from a niche product into standard technology in recent years. Most telephone providers switched their background technology to Voice over IP, or VoIP for short, long ago. BITKOM, the German ...

page 2 from 3